• Title/Summary/Keyword: Threshold signature

Search Result 44, Processing Time 0.026 seconds

Fatty Acid Methyl Ester (FAME) Technology for Diagnosing Nocardia Foaming in Activated Sludge (활성슬러지내 Nocardia 거품현상 진단을 위한 Fatty Acid Methyl Ester (FAME) 기술)

  • Lee, Jae Woo;Kim, Il Kyu;Lee, Seok Hun;Ahn, Kyu-Hong;Cha, Daniel K.
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.18 no.4
    • /
    • pp.480-485
    • /
    • 2004
  • Fatty acid methyl ester (FAME) technology was evaluated as a monitoring tool for quantification of Nocardia amarae causing a nuisance foaming problem in activated sludge process. The identified signature peak was 19:1 alcohol as a reliable unique peak to N. amarae. Chemostat study revealed that the distribution and quantity of fatty acid peaks were dependent on the growth stage of Nocardia. The FAME results were similar for two relatively high dilution rates; however, the amounts of signature peaks extracted from the 4 and 6 day cultures were significantly higher. This dependence of signature peaks on the physiological state of the organism may be a useful information to assess the health of microbial populations in activated sludge. A laboratory scale batch foaming potential experiment provided a critical foaming level depending on Nocardia population. This critical Nocardia level determined in this study was in terms of either the threshold filament intersections number or the threshold signature FAME amount. The threshold peak area of signature FAME (19:1 alcohol) and corresponding filament counts were 430PA/mg VSS and $1.45{\times}10^6$ intersections/g VSS, respectively. The threshold signature FAME level could be effectively applied as a criterion for diagnosing foam occurrence in activated sludge system.

A Study on the Proxy Signatures (II) - Part 2 : Proxy Signatures with Threshold Delegation - (대리 서명방식에 관한 연구 (II) - 제 2부 : 역치 위임에 의한 대리 서명방식 -)

  • 김승주;박상준;정권성;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.34-40
    • /
    • 1997
  • By proxy signatures, proposed by Mambo, a designated signer can sign original's signature instead of original signer. This paper presents new types of digital proxy signatures called partial delegation with threshold delegation. In proxy signatures for partial delegation with threshold delegation, the proxy signer's power to sign messages is shared. In conclusion, we construct proxy signature schemes satisfying our conditions.

  • PDF

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

A Structural Representation of Handwritings for Automatic On-line Signature Verification (온라인 서명 검증을 위한 필기의 구조적 표현)

  • Kim, Seong-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.3
    • /
    • pp.147-154
    • /
    • 2005
  • In conventional approaches such as a functinal approach or a parametric approach to online signature verification, which could not deal with the local shape of signature, much various important informations inherent in the local part of signature shape have been overlooked. In this paper, we try a structural approach in which a signature is represented as a structural form of handwriting primitives and the local parts along a signature handwriting can be selectively compared according to their discrimination power in the process of signature verification, As a result, the error rate is diminished in the case that the weights of subpattern units is applied into comparing process, which is the degree of discrimination power of local part. And also, the global variation and complexity of each signature extracted from the analysis of local shape is found useful in determining the decision threshold more precisely.

  • PDF

A Technique of Calculating a Weighted Euclidean Distance with a Personalized Feature Set in Parametric Signature Verification (매개변수적 서명 검증에서 개인화된 특징 집합의 가중치 유클리드 거리 산출 기법)

  • Kim, Seong-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.3
    • /
    • pp.137-146
    • /
    • 2005
  • In parametric approach to a signature verification, it generally uses so many redundant features unsuitable for each individual signature that it causes harm, instead. This paper proposes a method of determining personalized weights of a feature set in signature verification with parametric approach by identifying the characteristics of each feature. For an individual signature, we define a degree of how difficult it is for any other person to forge the one's (called 'DFD' as the Degree of Forgery Difficulty). According to the statistical characteristics and the intuitional characteristics of each feature, the standard features are classified into four types. Four types of DFD functions are defined and applied into the distance calculation as a personalized weight factor. Using this method, the error rate of signature verification is reduced and the variation of the performance is less sensitive to the changes of decision threshold.

  • PDF

Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting

  • Zhou, Yihua;Dong, Songshou;Yang, Yuguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.287-304
    • /
    • 2022
  • With the development of quantum computers, ring signature schemes based on large integer prime factorization, discrete logarithm problem, and bilinear pairing are under threat. For this reason, we design a ring signature scheme based on lattice with a fixed verification key. Compared with the previous ring signature scheme based on lattice, our design has a fixed verification key and does not disclose the signer's identity. Meanwhile, we propose an anonymous electronic voting scheme by using our ring signature scheme based on lattice and (t, n) threshold scheme, which makes up for the lack of current anonymous electronic voting that cannot resist attacks of the quantum computer. Finally, under standard model (SM), we prove that our ring signature scheme based on lattice is anonymous against the full-key exposure, and existentially non-forgeable against insider corruption. Furthermore, we also briefly analyze the security of our anonymous electronic voting scheme.

A Technique for On-line Automatic Signature Verification based on a Structural Representation (필기의 구조적 표현에 의한 온라인 자동 서명 검증 기법)

  • Kim, Seong-Hoon;Jang, Mun-Ik;Kim, Jai-Hie
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2884-2896
    • /
    • 1998
  • For on-line signature verification, the local shape of a signature is an important information. The current approaches, in which signatures are represented into a function of time or a feature vector without regarding of local shape, have not used the various features of local shapes, for example, local variation of a signer, local complexity of signature or local difficulty of forger, and etc. In this paper, we propose a new technique for on-line signature verification based on a structural signature representation so as to analyze local shape and to make a selection of important local parts in matching process. That is. based on a structural representation of signature, a technique of important of local weighting and personalized decision threshold is newly introduced and its experimental results under different conditions are compared.

  • PDF

Efficient Identity-based Threshold Proxy Signature (효율적인 ID 기반의 Threshold 대리 서명)

  • Cho, Won-Hee;Park, Kun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.949-951
    • /
    • 2005
  • ID기반의 암호 시스템은 사용자의 ID를 공개키처럼 활용하는 시스템[1]이다. ID 기반 threshold 대리 서명(IDTPS)은 이러한 환경에서 사용 가능한 threshold 대리 서명 기법이며, Xu 등[2]에 의해 SOK-IBS[3]를 기반으로 처음 만들어졌다. 본 논문에서는 Cha-Cheon[4]의 서명 기법을 기반으로 하는 효율적인 ID 기반의 threshold 대리 서명을 제안한다. 여기서는 pairing 연산을 적게 사용하고 pairing에 사용되는 군으로 사상되는 해쉬 함수를 적게 사용하기 때문에 이전 기법보다 효율적이면서도 충분한 안전성을 보장하게 된다.

  • PDF

Security of the revised Xue-Cao threshold proxy signature scheme (개선된 Xue-Cao threshold 대리서명 기법의 안전성)

  • Park Je-Hong;Park Sang-Woo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.79-82
    • /
    • 2006
  • 다중 사용자 환경에서 안전한 대리서명을 설계하는 연구의 하나로, threshold 서명 방식을 대리서명에 적용한 threshold 대리서명 기법들이 최근 많이 제안되고 있다. Xue와 Cao가 2004년 발표한 threshold 대리서명 기법은 Hsu-Wu 자체인증 공개키 방식 (Self-certified public key)을 기반으로 설계된 것으로 WISA 2005, CISC 2005, ICCSA 2006에서 각각 다른 취약성이 밝혀진 바 있다. 특히 CISC 2005, ICCSA 2006에서는 각각의 공격방법에 내성을 가질 수 있도록 Xue-Cao 기법을 개선하는 방안을 같이 제시하였다. 본 논문에서는 이러한 개선안이 적용된 Xue-Cao 기법에 대해 두 가지 종류의 원서명자 위조 공격이 가능함을 보인다. 하나는 Hsu-Wu 자체인증 공개키 방식의 취약성을 이용하는 것이고 다른 하나는 Xue-Cao 기법의 서명 생성 방식의 취약성에 기반한 것이다. 이러한 공격을 통해 개선된 Xue-Cao 기법 또한 대리자 보호, 부인방지와 같은 안전성 조건을 만족하지 않음을 확인한다.

  • PDF

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization

  • Benziane, Sarah Hachemi;Benyettou, Abdelkader
    • Journal of Information Processing Systems
    • /
    • v.13 no.2
    • /
    • pp.268-284
    • /
    • 2017
  • The dorsal hand vein biometric system developed has a main objective and specific targets; to get an electronic signature using a secure signature device. In this paper, we present our signature device with its different aims; respectively: The extraction of the dorsal veins from the images that were acquired through an infrared device. For each identification, we need the representation of the veins in the form of shape descriptors, which are invariant to translation, rotation and scaling; this extracted descriptor vector is the input of the matching step. The optimization decision system settings match the choice of threshold that allows accepting/rejecting a person, and selection of the most relevant descriptors, to minimize both FAR and FRR errors. The final decision for identification based descriptors selected by the PSO hybrid binary give a FAR =0% and FRR=0% as results.